城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.242.212.0 - 103.242.215.255'
% Abuse contact for '103.242.212.0 - 103.242.215.255' is '4962142@qq.com'
inetnum: 103.242.212.0 - 103.242.215.255
netname: GZGD
descr: Guizhou provincial radio and television information Network Inc
descr: No.36,Jinyang Road,Jinyang District,Guiyang,Guizhou Province,China
country: CN
admin-c: ML1975-AP
tech-c: BW748-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-GZGD-CN
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
last-modified: 2023-11-28T00:56:22Z
source: APNIC
irt: IRT-GZGD-CN
address: No.36,Jinyang Road,Jinyang District,Guiyang,Guizhou Province,China
e-mail: 4962142@qq.com
abuse-mailbox: 4962142@qq.com
admin-c: ML1975-AP
tech-c: BW748-AP
auth: # Filtered
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-11-18T00:35:11Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Penn Yan
address: No.36,Jinyang Road,Jinyang District,Guiyang,Guizhou Province,China
country: CN
phone: +86-08514115584
e-mail: 3750966@qq.com
nic-hdl: BW748-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2013-09-25T06:12:02Z
source: APNIC
person: Heng Zhang
address: No.36,Jinyang Road,Jinyang District,Guiyang,Guizhou Province,China
country: CN
phone: +86-08514115584
e-mail: 4962142@qq.com
nic-hdl: ML1975-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2013-09-25T06:12:02Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.242.215.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17387
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.242.215.138. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025120201 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 03 03:19:12 CST 2025
;; MSG SIZE rcvd: 108
Host 138.215.242.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 138.215.242.103.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 49.234.18.158 | attack | Sep 6 02:55:10 sshgateway sshd\[13391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 user=root Sep 6 02:55:12 sshgateway sshd\[13391\]: Failed password for root from 49.234.18.158 port 59986 ssh2 Sep 6 03:03:58 sshgateway sshd\[14605\]: Invalid user test from 49.234.18.158 |
2020-09-07 01:26:59 |
| 179.247.178.221 | attackbots | Attempted connection to port 445. |
2020-09-07 01:18:14 |
| 156.197.91.10 | attackbots | Attempted connection to port 445. |
2020-09-07 01:19:20 |
| 220.135.116.247 | attackspambots | 1599406068 - 09/06/2020 17:27:48 Host: 220.135.116.247/220.135.116.247 Port: 23 TCP Blocked ... |
2020-09-07 01:31:00 |
| 114.219.90.252 | attack | Aug 31 07:42:30 georgia postfix/smtpd[36598]: connect from unknown[114.219.90.252] Aug 31 07:42:32 georgia postfix/smtpd[36598]: warning: unknown[114.219.90.252]: SASL LOGIN authentication failed: authentication failure Aug 31 07:42:32 georgia postfix/smtpd[36598]: lost connection after AUTH from unknown[114.219.90.252] Aug 31 07:42:32 georgia postfix/smtpd[36598]: disconnect from unknown[114.219.90.252] ehlo=1 auth=0/1 commands=1/2 Aug 31 07:42:33 georgia postfix/smtpd[36598]: connect from unknown[114.219.90.252] Aug 31 07:42:43 georgia postfix/smtpd[36598]: warning: unknown[114.219.90.252]: SASL LOGIN authentication failed: authentication failure Aug 31 07:42:43 georgia postfix/smtpd[36598]: lost connection after AUTH from unknown[114.219.90.252] Aug 31 07:42:43 georgia postfix/smtpd[36598]: disconnect from unknown[114.219.90.252] ehlo=1 auth=0/1 commands=1/2 Aug 31 07:42:44 georgia postfix/smtpd[36598]: connect from unknown[114.219.90.252] Aug 31 07:42:53 georgia pos........ ------------------------------- |
2020-09-07 00:52:56 |
| 195.226.203.15 | attack | Attempted connection to port 445. |
2020-09-07 01:13:36 |
| 218.102.106.61 | attackbotsspam | Honeypot attack, port: 5555, PTR: pcd574061.netvigator.com. |
2020-09-07 01:25:18 |
| 190.98.53.86 | attack | 6-9-2020 01:24:39 Unauthorized connection attempt (Brute-Force). 6-9-2020 01:24:39 Connection from IP address: 190.98.53.86 on port: 587 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=190.98.53.86 |
2020-09-07 00:53:09 |
| 186.167.64.162 | attackbotsspam |
|
2020-09-07 01:16:45 |
| 45.140.17.57 | attackspambots | Scanning |
2020-09-07 01:02:18 |
| 139.162.75.112 | attackspam | Sep 6 06:06:46 propaganda sshd[19094]: Connection from 139.162.75.112 port 59786 on 10.0.0.161 port 22 rdomain "" Sep 6 06:06:46 propaganda sshd[19094]: error: kex_exchange_identification: Connection closed by remote host |
2020-09-07 01:24:33 |
| 116.247.81.99 | attack | Triggered by Fail2Ban at Ares web server |
2020-09-07 01:31:48 |
| 116.109.234.188 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-07 01:01:36 |
| 134.17.94.214 | attack | Sep 6 05:40:14 ws22vmsma01 sshd[95394]: Failed password for root from 134.17.94.214 port 12212 ssh2 Sep 6 08:32:48 ws22vmsma01 sshd[218811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.214 ... |
2020-09-07 01:11:09 |
| 121.32.46.29 | attackspambots | Attempted connection to port 445. |
2020-09-07 01:21:59 |